[5685] in Kerberos

home help back first fref pref prev next nref lref last post

Re: Preauthentication

daemon@ATHENA.MIT.EDU (Sam Hartman)
Fri Aug 11 18:46:41 1995

To: Glenn Machin <gmachin@sahp044.sandia.gov>
Cc: kerberos@MIT.EDU
In-Reply-To: Your message of "Fri, 11 Aug 1995 15:07:44 MDT."
             <199508112115.PAA28795@sass165.sandia.gov> 
Date: Fri, 11 Aug 1995 18:36:35 EDT
From: Sam Hartman <hartmans@MIT.EDU>

>>>>> "Glenn" == Glenn Machin <gmachin@sahp044.sandia.gov> writes:

   
    Glenn> I thought the padata being set to a timestamp with some
    Glenn> randomness attached, was useful in that it prevented
    Glenn> someone from getting someone elses tgt and breaking the
    Glenn> encryption at leasure. With an encrypted padata, the KDC
    Glenn> could determine whether or not the requestor actually knew
    Glenn> the password, and do blacklisting if need be.  OSF DCE
    Glenn> security server (1.1) uses it. Why didnt MIT at least ifdef
    Glenn> that area?

	As I understand it, the code to do this will eventually be
written.  It hasn't been checked into the tree yet.  Honestly, it
isn't that useful in most realms today because you need to support v4,
and an attacker can grab all the v4 tickets they want.

	Also, it's nice as a user to be able to only be prompted for a
password if a ticket is received.  (I realize several kinit versions
out there don't do this, but it is possible).  

	Finally, an attacker can always grab padata as people kinit,
although this is somewhat more difficult than the attacker actively
requesting tickets.  The real answer is to have good passwords and possibly
hardware preauth.

--Sam

home help back first fref pref prev next nref lref last post